Page 1 of 15 General Information of Malware Definition of Malware

General Information of Malware
Definition of Malware
Malware, also known as malicious code, is short for malicious software and is used to
broadly referring to any software that is unauthorized and covertly inserted into a computer
system with the intent of compromising the confidentiality, integrity, or availability of the
victim’s data, applications, or operating systems or otherwise annoying or disrupting the victim.
In the 1980s, malware was occasionally a nuisance or inconvenience to individuals and
organizations; today, malware is the most significant external threat to most systems,
causing widespread damage and disruption and necessitating extensive recovery efforts
within most organizations.
Motivations of Malware Creation
Malware writers can have various reasons for creating and spreading malware. The
following are common reasons:
1.
2.
3.
4.
5.
6.
7.
Fun/Hobby/Spreading of ideological
Some malware writers consider their creations to be works of art, and see malware
writing as a creative hobby.
Jocks/Pranks
Pranks are harmless that merely display an annoying message to programs that can
destroy files or disable a computer altogether.
Showing computing knowledge/ Gaining respect
A widely spread malware and is observed by mass media can show malware
writers’ knowledge and gain great respect in a small group of like-minded people.
Industrial espionage
Obtaining secret information about a company by using weaknesses and defects in
the company's IT-system is something that is quite common today.
Experimental/ Research/Proof of Concepts
Malware are written in laboratories and research facilities for experimental or
research purpose. Most of these malware do not spread. Usually malware in labs
and research facilities test systems is called in-the-field. Others malware that have
been found infecting users’ computers worldwide in real world are called in-thewild.
Vandalism/Graffiti
The intentional destruction of property is popularly referred to as vandalism. It
includes behavior such as breaking windows, slashing tires, spray painting a wall
with graffiti, and destroying a computer system through the use of a computer
malware. Vandalism is a malicious act and may reflect personal ill will, although
the perpetrators need not know their victim to commit vandalism.
Revenge
There are always employees who are not particularly satisfied with their employer.
When a programmer or system administrator about to be fired from a job may
leave behind backdoors or software "time bombs" that will allow them to damage
Page 1 of 15
8.
9.
the former employer's systems or destroy their own earlier work.
Malware are used to attack the products of specific companies or web sites.
According to the FBI, revenge from employees is a very common reason for ITrelated crimes.
Political message
Malware which infects executable files on compromised computers and displays a
political message when launched. This type of malware usually targets particular
government organizations.
Profit/Financial gain/Extortion
Most malware writers motivated by profit/financial gain are more and more likely
to be working with spammers and hackers. One of the most common methods is
by stealing sensitive information which is then sold on the black market to
criminal organizations to make a profit.
Some Malware will encrypt some of your files on your computer then it leaves a
message to contact a certain email address with a reference number so that you can
buy back your own files.
Life Cycle of a Malware
1.
2.
3.
4.
Creation
Prior to today, creating a malware required knowledge of a computer
programming language. Today anyone with basic programming knowledge with
Internet access can create a malware. There are many web sites provide malware
source codes downloads and instructions showing interested people how to create
and to spread malicious code. They also encourage individuals to develop their
own harmful version of already existing, and tried-and-tested malicious programs.
Kits are malware-generating applications that often provide users the option to
create customized malware. Most kits can produce multiple variations of a
malware. Many have been used to generate new variants of existing worms.
Replication and Propagation
Malware propagate in a number of ways. Worms may spread via email, instant
messengers, or network shares. Viruses replicate within a system, while some
viruses also have automatic propagation techniques similar to worms. Trojans.
While not having any automatic form of replication and propagation, are
nevertheless available all over the Internet, and the links to download them from
may be included in email messages, or other Web sites.
Activation
Most malware perform their malicious activities upon execution. Some have
certain payloads that are activated only at a certain trigger date, or with the onset
of a specific trigger condition.
Discovery
This phase does not always follow activation (but typically does). When a malware
is detected and isolated, it is sent to the ICSA (International Computer Security
Association) in Washington, D.C., to be documented and distributed to antivirus
software developers. However, with the rapid development of technology, and the
ease by which malware authors create their programs, most malware are released
Page 2 of 15
5.
6.
to unsuspecting users even before they are discovered by the "authorities". This is
all the more reason to protect your system from the threats that surround the
computing world today.
Assimilation
At this point, antivirus software developers modify their software so that it can
detect the new malware. This can take anywhere from several hours to several
days, depending on the developer and the malware type.
Eradication
If enough users install up-to-date virus protection software, any malware can be
wiped out. So far no malware have disappeared completely, but some have long
ceased to be a major threat.
Propagation Methods of Malware
1.
Network shares
A prevalent propagation method of malware today is via network shares. Malware
that propagate via network shares access target systems in the following ways:
■
Dictionary and Brute-Force Attack
Some malware are hard-coded with a list of common user names and
passwords in their body. The malware then uses this list to launch a
dictionary attack to hack into the target system.
A dictionary attack is defined as a brute-force attack in which the malware
tries out all possible combinations of user names and passwords from its
hard-coded list to access a system.
Computer users use an easy to guess user name and password may have
greater potential of unauthorized account access or unauthorized entry of the
customer’s network.
■
Exploits
Any software may contain so-called vulnerabilities, or "holes" in the
software code. Holes can be exploited by malware writers to perform
malicious routines. Software vendors usually release a patch for discovered
vulnerabilities, but it is still the user’s responsibility to make sure that
patches are installed.
Microsoft releases a Security Bulletin every month for any discovered
vulnerabilities. Customers using Microsoft applications are advised to
regularly go to the Microsoft Update Center to obtain system patches against
known Microsoft vulnerabilities.
■
Peer-to-peer (P2P) programs
Peer-to-peer (P2P) programs have become increasingly popular as the
Internet has grown increasingly diverse. Users commonly exchange files via
P2P applications. Upon installation, a user is usually asked to specify a
shared folder, the folder most commonly used to store files for sharing. It is
exactly this folder that some malware use to propagate.
Some malware drops a copy of itself in folders it assumes to be shared (such
as those with shar in its folder name), and uses an inconspicuous file name
(usually posing as a legitimate software, or as an archived image). The
Page 3 of 15
2.
3.
malware spreads when users download and execute it.
Some commonly used file names of malware copies in shared folders are The
Sims crack.EXE, DivX 7.0 final.EXE, and ACDSee 9.EXE.
■
Current user account
A malware may also use the current account to access other systems in the
network. This is possible, especially if the current user is an administrator, or
has special privileges that allow access of network folders.
Email messages
Mass-mailing malware are capable of sending out a large number of email
messages at a time to specific addresses. There are numerous mass-mailers that
have wreaked havoc, and in the process, become very publicized, due to their
ability to use social engineering to spread rapidly across the globe.
Social engineering is a method used by malware authors to entice users to
inadvertently aid the spread of these malware. Malware authors fashion email
messages that are intriguing, or pretend to be from legitimate organizations.
Unsuspecting users are made to think they have received a harmless greeting card
or a virus warning from the system administrator, when they have actually
received a mass-mailing worm.
So far, social engineering remains the only constantly successful propagation
technique a malware can have. There is no foolproof measure against social
engineering, as it manipulates common email user activity and popular interests.
The email messages of mass-mailers arrive with varying details. Some email
messages arrive with a spoofed <From> address while others use the email address
of the infected user. Some may use the email address of someone in the intended
victim’s own Address Book to make the user continuously believe that the content
is trustworthy.
The message body is usually something vague or intriguing, which encourages the
user to open the attachment to find out more. Common attachments usually have
an .EXE, .PIF, or .SCR extension.
A large-scale mass-mailing outbreak is capable of causing millions of dollars in
damage. Email servers may become clogged with the volume of emails the massmailer sends out, and at the same time, may also clog recipients’ mailboxes.
Networks may suffer congestion, and available bandwidth can be severely
reduced. Infected systems may slow down because of the mass-mailing activity,
hampering their performance and efficiency to system users.
In addition, some mass-mailers have other malicious routines called payloads.
Some mass-mailers may overwrite files, or may cause system functions to fail.
Others may perform denial of service (DoS) attacks, in which a Web site is subject
to continuous and relentless access requests, causing the server of that Web site to
break down.
Instant Messengers
The increasing popularity of instant messaging among computer users in the home
and in the business environment has turned it into one of the most recent and
effective infection vectors.
Worms may propagate via popular instant messaging services provided by Internet
giants like Yahoo, AOL, and MSN. Such worms mainly employ the following
Page 4 of 15
4
methods of propagation via instant messengers:
■
The worm sends copies of itself by using the file transfer feature of the
instant messengers.
■
Instant messages may contain links that point to another malware. Thus, once
the user clicks on a particular link displayed in an instant messenger dialog
box, a copy of the worm or any other malware is automatically downloaded
and executed on the affected system.
Other Propagation Methods
There are malware, such as Trojans and backdoor applications, which have no
inherent propagation method. They are usually manually installed by a user, or
may be downloaded (automatically or manually) from Web sites.
Although these malware usually need the presence of several components to
properly execute, when all components are present, they are capable of malicious
activities, such as stealing information from the user, or dropping and executing
other malware in the system. Others may delete files, or allow a remote user to
access the infected system.
Please perform the following preventive measures to protect systems from these
types of attacks:
■
Regularly upgrade Internet browsers. Check the browser’s Web site for
updates and patches.
■
Check browser security levels. Make sure that the sites specified as Trusted
Sites are correct, and that Security Settings are appropriate.
■
Some malware pose as harmless programs that aim to “improve” the
performance of your system, and ask to be downloaded and installed. Users
are advised to not agree to install any program that they are not comfortable
or familiar with. Verify the publisher and installer before you install them.
■
Think before clicking the Yes button on browser pop-ups. Read descriptions
and disclaimers; and know what is being agreed to.
■
Make sure that people who access the network have the appropriate
privileges, and that network shares have the appropriate permissions.
Types of Malware
The following are well-known types of malware:
1.
2.
Virus
A computer virus, commonly referred to as a virus, is a program or a piece of
executable code that has the ability to replicate its own code (self-replication) by
attaching itself to other executable files (host file infection) and are spread as files
that are copied and sent from individual to individual. In such a way that the virus
code is executed when the infected executable file is executed. Well-known viruses
include Michelangelo and CIH.
Worm
A computer worm is a self-contained program or set of programs that is able to
spread functional copies of itself or its segments to other computer systems. The
propagation usually takes place via network connections or email attachments.
Page 5 of 15
3.
4.
5.
Usually worm does not require human interaction to spread. Worm spreads via
vulnerabilities or misconfigurations in target systems. However, for a small number
of worms, some user interaction is necessary for propagation (e.g., opening an email viewer). Well-known worms include Morris Worm, Code Red, SQL Slammer,
Netsky, SoBig, CodeRed, and Sasser.
Trojan horse
A Trojan is a malware that performs a malicious action, but has no replication
abilities. Coined from Greek mythology's Trojan horse, a Trojan may arrive as a
useful file or application and seemingly harmless, but actually has some hidden
malicious intent within its code. Trojan malware usually have a payload. When a
Trojan is executed, you may experience unwanted system problems in operation,
and sometimes loss of valuable data. Well-known Trojan horses include Setiri and
Hydan.
Malicious Mobile Code
Malicious mobile code is a general term for any executable lightweight program
that is downloaded from a remote system and executed locally with minimal or no
user intervention to make your system do something that you do not want it to do.
Malicious mobile code can be an effective way of attacking systems, as well as a
good mechanism for transmitting viruses, worms, and Trojan horses to users.
Malicious mobile code differs from viruses and worms in that it does not infect
files or attempt to propagate itself. Instead of exploiting particular vulnerabilities, it
often affects systems by taking advantage of the default privileges granted to
mobile code. Popular languages for malicious mobile code include Java, ActiveX,
JavaScript, and VBScript. One of the best-known examples of malicious mobile
code is Nimda, which used JavaScript.
Combination malware (blended threat)
A Combination malware (blended threat) is an attack that bundles some of the
aspects of viruses, worms, Trojan horses and malicious code into one threat.
Blended threats use server and Internet vulnerabilities to initiate, transmit and
spread an attack. This combination of method and techniques means blended
threats can spread quickly and cause widespread damage. Characteristics of
blended threats include: causes harm, propagates by multiple methods, attacks from
multiple points and exploits vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport
multiple attacks in one payload. For example it wouldn't just launch a Denial of
Service (DoS) attack — it would also install a backdoor and damage a local system
in one shot. Additionally, blended threats are designed to use multiple modes of
transport. For example, a worm may travel through e-mail, but a blended threat
could use multiple routes such as e-mail, IRC and file-sharing sharing networks.
The actual attack itself is also not limited to a specific act. For example, rather than
a specific attack on predetermined .exe files, a blended thread could modify exe
files, HTML files and registry keys at the same time — basically it can cause
damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of
viruses, as most blended threats require no human intervention to propagate. The
well-known examples of blended threats are Lion and Bugbear.B
Page 6 of 15
6.
Attacker Tools
As part of a malware infection or other system compromise, various types of
attacker tools might be delivered to a system. These tools, which are forms of
malware, allow attackers to have unauthorized access to or use of infected systems
and their data, or to launch additional attacks. When transferred by other malware,
attacker tools can be delivered as part of the malware itself, (e.g., in a Trojan horse)
or delivered after an infection occurs. For example, a worm-infected system might
be directed by the worm to contact a particular malicious Web site, download tools
from that site, and install them on the system. The following are commonly used
attacker tools:
■
Backdoor
Backdoor is a general term for a malicious program that listens for commands
on a certain Transmission Control Protocol (TCP) or User Datagram Protocol
(UDP) port. Most backdoors consist of a client component and a server
component. The client resides on the intruder’s remote computer, and the
server resides on the infected system. When a connection between client and
server is established, the remote intruder has some degree of control over the
infected computer. At a minimum, most backdoors allow an attacker to
perform a certain set of actions on a system, such as transferring files,
acquiring passwords, or executing arbitrary commands. Backdoors may also
have special capabilities, as follows:
□
Zombies
A zombie, sometimes called a bot, is a program that is installed on a
system to cause it to attack other systems. The most prevalent type of
zombie is a Distributed Denial of Service attack (DDoS) (agent; an
attacker can issue remote commands to many agents at once so that they
perform a coordinated attack against a target. Well-known DDoS agents
include Trinoo and Tribe Flood Network.
□
Remote Administration Tools
A remote administration tool (RAT) installed on a system enables a
remote attacker to gain access to the system as needed. Most RATs
grant full access to the system’s functions and data. This may include
the ability to watch everything that appears on the system’s screen, or to
have remote control over the system’s devices, such as webcams,
microphones, and speakers. Well-known RATs include SubSeven, Back
Orifice, and NetBus.
Both Netcat and Virtual Network Computing (VNC) can be used
legitimately as remote administration tools, or illegitimately as attack
tools.
■
Rootkit
The term rootkit comes from the Unix-based operating systems' most
powerful account -- the "root" -- which has capabilities similar to the built-in
Administrator account in Windows.
When an attacker who compromised a computer would gain root privileges
and install his or her collection of applications and utilities, known as a "kit,"
on the compromised system.
Page 7 of 15
Simply speaking, a rootkit is a set of tools used by an intruder after cracking a
computer system. These tools can help the attacker maintain his or her access
to the system and use it for malicious purposes. An attacker enters the
victim’s computer through a security loop hole, like a weak password or a
missing patch and then installs collection of tools which will provide him
backdoor(s) to remotely access the cracked system and also mask the fact that
the system is compromised.
Though not very prevalent currently other than an open source NT rootkit
called Hacker Defender, some malware programs are reportedly using rootkit
like mechanisms to hide in the bowels of Windows to evade detection and
removal.
Typically, rootkits do not exploit operating system flaws, but rather their
extensibility. Windows, for example, is modular, flexible and designed as an
easy platform upon which to build powerful applications. Rootkits created for
Windows take advantage of these same features by extending and altering the
operating system with their own suite of useful.
■
■
There are two different types of RootKit:
□
User-level Rootkit
Replaces or modifies executable programs used by system
administrators and users. Examples include Linux Rootkit (LRK)
family, Universal Rootkit, and FakeGINA
□
Kernel-level Rootkit
Manipulates the heart of the operating system, the kernel, to hide and
create backdoors. Examples include Adore and Kernel Intrusion System
Keystroke loggers
A keystroke logger, also known as a keylogger, monitors and records
keyboard use. Keystroke loggers can record the information typed into a
system, which might include the content of e-mails, usernames and passwords
for local or remote systems and applications, and financial information (e.g.,
credit card number, social insurance number (SIN), personal identification
number (PIN)). Some keystroke loggers require the attacker to retrieve the
data from the system, whereas other loggers actively transfer the data to
another system through e-mail, file transfer, or other means. Examples of
keystroke loggers are KeySnatch, Spyster, and KeyLogger Pro.
Tracking cookies
A cookie is a small data file that holds information about the use of a
particular Web site. There are two different cookies:
□
Session cookies
Session cookies are temporary cookies that are valid only for a single
Web site session.
□
Persistent cookies
Persistent cookies are stored on a computer indefinitely so that the site
can identify the user during subsequent visits.
The intended use of a persistent cookie is to record user preferences for a
single Web site so that the site can automatically customize its appearance or
Page 8 of 15
■
■
■
behavior for the user’s future visits. In this way, persistent cookies can help
Web sites serve their users more effectively.
Unfortunately, persistent cookies also can be misused as spyware to track a
user’s Web browsing activities for questionable reasons without the user’s
knowledge or consent. For example, a marketing firm could place
advertisements on many Web sites and use a single cookie on a user’s
machine to track the user’s activity on all of those Web sites, creating a
detailed profile of the user’s behavior. Cookies used in this way are known as
tracking cookies. Information collected by tracking cookies is often sold to
other parties and used to target advertisements and other directed content at
the user. Most spyware detection and removal utilities specifically look for
tracking cookies on systems.
Another way to capture and deliver a user’s private information is through the
use of Web bugs. A Web bug is a tiny graphic on a Web site that is referenced
within the Hypertext Markup Language (HTML) content of a Web page or email. The graphic has no purpose other than to collect information about the
user viewing the HTML content. Web bugs are usually invisible to users
because they typically consist of only 1 pixel. Like tracking cookies, Web
bugs are often used by marketing firms. They can collect information such as
the user’s Internet Protocol (IP) address and Web browser type and can also
access a tracking cookie. These actions enable Web bugs to be used as
spyware to create personal profiles of individual users.
Web Browser Plug-Ins
A Web browser plug-in provides a way for certain types of content to be
displayed or executed through a Web browser. Attackers sometimes create
malicious plug-ins that act as spyware. When installed in a browser, these
plug-ins can monitor all use of the browser, such as which Web sites and
pages a user visits, and report the use to an external party. Because plug-ins
are loaded automatically when a Web browser is started, they provide an easy
way to monitor Web activity on a system. Some malicious Web browser
plug-ins are spyware dialers, which use modem lines to dial phone numbers
without the user’s permission or knowledge. Many of the dialers are
configured to call numbers that have high per-minute charges, while others
make nuisance calls to numbers such as emergency services 911.
E-Mail Generators
Malware can deliver an e-mail generating program to a system, which can be
used to create and send large quantities of e-mail to other systems without the
user’s permission or knowledge. Attackers often configure e-mail generators
to send malware, spyware, spam, or other unwanted content to e-mail
addresses on a predetermined list.
Attacker Toolkits
Many attackers use toolkits containing several different types of utilities and
scripts that can be used to probe and attack systems. Once a system has been
compromised through malware or other means, an attacker might download
and install a toolkit on the system. The toolkit can then be used to further
compromise the system on which it has been installed, or to attack other
Page 9 of 15
7.
systems. Types of programs typically found in an attacker toolkit are as
follows:
□
Packet Sniffers
Packet sniffers are designed to monitor network traffic on wired or
wireless networks and capture packets. Packet sniffers generally can be
configured the sniffer to capture all packets or only those with particular
characteristics (e.g., certain TCP ports, certain source or destination IP
addresses). Most packet sniffers are also protocol analyzers, which
mean that they can reassemble streams from individual packets and
decode communications that use any of hundreds or thousands of
different protocols.
□
Port Scanners
A port scanner is a program that attempts to determine remotely which
ports on systems are open (i.e., whether systems allow connections
through those ports). Port scanners help attackers to identify potential
targets.
□
Vulnerability Scanners
A vulnerability scanner is a program that looks for vulnerabilities on
either the local system or on remote systems. Vulnerability scanners
help attackers to find hosts that they can exploit successfully.
□
Password Crackers
Various utilities are available that can crack operating system and
application passwords. Most cracking utilities can attempt to guess
passwords, as well as performing brute force attempts that try every
possible password. The time needed for a brute force attack on an
encoded or encrypted password can vary greatly, depending on the type
of encryption used and the sophistication of the password itself.
□
Remote Login Programs
Attacker toolkits often contain programs such as secure shell (SSH) and
telnet that can be used to log in to other systems remotely. Attackers can
use these programs for many purposes, such as controlling
compromised systems and transferring data between systems.
□
Attacks
Attacker toolkits often contain a variety of utilities and scripts that can
launch attacks against the local system or remote systems. The attacks
may have a variety of purposes, including compromising a system or
causing a denial of service (DoS).
Spyware
Spyware is a general term used to describe software that designed to capture
information from or take control of user computer without appropriately obtaining
users’ consent first. This software falls into a number of categories:
■
Security monitoring:
Software that may be installed legitimately to provide security or workplace
monitoring,
■
Advertising:
Software that tracks user online activities for marketing purpose and displays
Page 10 of 15
■
■
advertising through pop-up or pop-under windows while you are surfing the
Web is typically called adware.
Adware is an advertisement-focused application that installs themselves on
systems with little or no user interaction.
That does not mean all software that provides ads or tracks your online
activities is bad. For example, you might sign up for a free music service, but
you "pay" for the service by agreeing to receive targeted ads. If you
understand the terms and agree to them, you may have decided that it is a fair
tradeoff. You might also agree to let the company track your online activities
to determine which ads to show you.
Collecting personal information or sensitive information:
Software that is maliciously installed, either as a general violation of a user’s
privacy or to collect information to allow further attacks on their computer or
online transactions.
Software that collects personal information or sensitive information is called
spyware. Spyware is potentially more dangerous beast than Adware because
it can record your keystrokes, history, passwords, and other confidential and
private information.
Changing the configuration of your computer:
Some type of Software that make changes to users’ computer that can be
annoying and can cause computer slow down or crash. These programs can
change Web browser's home page or search page, or add additional
components to browser that users don't need or want. These programs also
make it very difficult to change settings back to the originally configured.
Comparison of Some Malware Types
Characteristic
Malware
Virus
Worm
Trojan Horse
Malicious Mobile Code
Tracking Cookie
Attacker Tools
Self-containing
Self-replicating
No
Yes
Yes
No
Yes
Yes
Yes
Yes
No
No
No
No
Propagation
method
User interaction
Self-propagation
N/A
N/A
N/A
N/A
Types of Payload
The term payload refers to an action that a malware performs, apart from its main
characteristics. For example, payloads for a virus include all other actions (deleting files,
reformatting the user’s hard drive) it performs apart from its propagation Methods.
Payloads can range from something that is relatively harmless to something destructive:
1.
No payload
Malware do not contain any payloads.
Page 11 of 15
2.
3.
4.
5.
Minor Payloads
■
Ejecting the CD drive
■
Displaying messages or images
■
Degrading the overall performance of your computer
■
Consuming storage space and memory
Destructive Payloads
Destructive payloads are used to refer destructive actions which can incapacitate a
user’s access to a data or programs on their computer. Some destructive payloads
examples include:
■
Encrypting user’s data
■
Damaging user’s files
■
Deleting files on the user’s computer
■
Reformatting the user’s hard drive
■
Rendering the user’s machine unbootable
Data Export Payloads
Data export payloads export the user’s data to an outside hacker. The following are
some common user data examples:
■
User passwords
■
Credit card information
■
Documents
■
Spreadsheets
■
Keystrokes
Data Import Payloads
This type of payloads can import further programs/data in order to do further
damage. Malicious program, performs this type of payloads, is a small “ stub”
which, once running, connects to the web and downloads additional malicious
code.
Commonly Used Malware Self-Preservation Techniques
1.
Stealthing
Stealthing refers to the process of concealing the presence of malware on the
infected system. The following are commonly used methods:
■
Using hidden attribute
The most popular stealthing method that is used by companion viruses
involves simply setting the "hidden" attribute of the virus file to make it less
likely that the victim will discover the file in a directory listing.
■
No increasing the size of original file
When stream companion viruses attach to a host, no new files are created,
and most tools will report that the size of the original file did not change. On
a Windows computer that uses the NTFS file system, these viruses are
included in an alternate data stream associated with some normal file on the
system.
■
Providing wholesome image
Some malware can cover-up itself by intercepting the antivirus program's
attempt to read a file, and presenting a clean version of the file to the
Page 12 of 15
2.
3.
4.
scanner. When the scanner looks at the infected file, the infected file presents
a wholesome image to the scanner.
■
Slowing down the infection rate
A malware might slow down the rate at which it infects or damages files, so
that it takes the user a long time to realize the infection.
Polymorphism
Generally speaking, polymorphism is the process through which malicious code
modifies its appearance to prevent detection without actually changing its
underlying functionality (the same malicious code can assume many forms, all
with the same function). Using this technique, the malicious code dynamically
changes itself each time it runs. The malicious code still has the same purpose, but
a very different code base. Any signatures focused on the earlier form of the
malicious code will no longer detect the new, morphed versions. The following are
commonly discovered polymorphism technique:
■
The simplest ways to implement polymorphism technique in script-based
viruses is to have the malware modify the names of its internal variables and
subroutines before infecting a new host. These names are typically chosen at
random to complicate the task of creating a signature for the malware.
■
Another way of achieving polymorphism involves changing the order in
which instructions are included in the body of the malware. This could be
tricky to implement, because the malware needs to make sure that the new
order does not change the functionality of the code. Viruses can also modify
their signature by inserting instructions into their code that don't do anything,
such as subtracting and then adding 1 to a value. These functionally inert
instructions allow the code to maintain its original function, but evade some
signature-based detection.
■
In another polymorphic technique, a virus encrypts most of its code, leaving
in clear text only the instructions necessary to automatically decrypt itself
into memory during runtime. The virus would typically use a different
randomly generated key to encrypt its body, embed the key somewhere in its
code, and vary the look of the decryption algorithm to confuse signaturebased scanners. The MtE mutation engine, released around 1992, was the
first tool for easily adding polymorphic capabilities to arbitrary malicious
code while morphing the decryptor.
Metamorphism
Metamorphism is a process that applies a variety of syntax-mutating, behaviorpreserving metamorphoses to malicious code in order to defend themselves against
static analysis based detection methods. This is often done in subtle ways to ensure
that the malicious code evades detection without losing its potency. Metamorphic
viruses often change the structure of their files by varying the location of the
mutating and encrypting routines. Additionally, metamorphic malware such as
Simile have the ability to dynamically disassemble themselves, change their code,
and then reassemble themselves into executable form.
Antivirus Deactivation
One of the ways in which malicious code attempts to protect itself is by disabling
the virus protection mechanisms on the target machine. The most prominent
Page 13 of 15
candidates for deactivation are the processes that belong to antivirus software
running on the infected system. The most successful viruses employing this
technique might get onto the system unrecognized, and then hurry to disable
antivirus software before the malware gets detected or before the user updates the
database of virus signatures.
The ProcKill Trojan is one example of a malware that contains a list of more than
200 process names that usually belong to antivirus and personal firewall programs.
Once installed on the system, ProcKill searches the list of running processes and
terminates those that it recognizes. Without the appropriate antivirus and personal
firewall processes running on the machine, the virus has free reign to infect and
alter the system.
Prevention of Malware
There are many actions that malicious code can take in an attempt to bypass security
mechanisms. Each malware can be thwarted by the followings procedures:
1.
2.
3.
4.
5.
Protecting operating system
There are may malware using system vulnerability to transfer. Keep your
operating system up to date can avoid malware into your system in the first place.
Examples are:
■
Turn on Windows auto update.
■
Adopt patches for operating system.
Protecting applications
Keep your applications up to date. Apply security patches for applications is
another way to avoid malware into your system. Examples are:
■
Regularly check and install security updates provided by your preferred
instant messaging service.
■
Regularly check and install security updates for peer-to-peer (P2P) programs.
Using antivirus software
Antivirus software solutions have grown increasingly intelligent in their abilities to
spot stealthy polymorphic code and survive simple deactivation attempts. With
anti-virus application, you'll prevent most of known malware. Examples are:
■
Install anti-virus application on email servers, file servers, and work stations.
■
Keep anti-virus application signatures and scanning engine up to date.
■
Properly configure anti-virus application to do real-time scan and scheduled
scan.
■
Don’t turn off real-time scan.
Using a firewall
Firewall can be hardware or software. Trend Micro products (OfficeScan, PCcillin Network Security) have software firewall option.
Hardening configuration
Hardening operating system and application can avoid unnecessary security issues.
Examples are:
■
Properly configure your operating system and application.
■
Secure user accounts.
Page 14 of 15
6.
■
Set up appropriate user privileges.
■
Use a secure password.
User education
With user education, most of malicious codes will be less likely to find its way
into your systems in the first place. For example:
■
Do not open email messages from unknown senders
■
Do not open email messages from known persons that appear to be a
continuation of a correspondence if the topic does not seem relevant to
typical correspondence with the sender.
■
Do not open suspicious-looking attachments, such as unrequested materials,
or materials that have no relevance to the sender or recipient.
■
Scan attached files before opening them.
■
Never accept file transfer requests from an unknown source.
■
Never click on links sent by an unknown source.
Page 15 of 15